Static task
static1
Behavioral task
behavioral1
Sample
87a2bd997a39c446c15e9d0d3f7daa898fa569c5036eba353f3fd358e0ca2555.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
87a2bd997a39c446c15e9d0d3f7daa898fa569c5036eba353f3fd358e0ca2555.exe
Resource
win10v2004-20220901-en
General
-
Target
87a2bd997a39c446c15e9d0d3f7daa898fa569c5036eba353f3fd358e0ca2555
-
Size
125KB
-
MD5
0803c09a8ebd164a7b7628bc316a1fcb
-
SHA1
bdf96f2d1f62d882567c5658fd36d8f4b555b5d3
-
SHA256
87a2bd997a39c446c15e9d0d3f7daa898fa569c5036eba353f3fd358e0ca2555
-
SHA512
07939459d5a33ae17a33c107666a7b975e7210f4f68ab8bef19fe0c6b58b54db3f33633640f08211d97c5ed8c2a781adf06a5224eebae85b575b95534f0cfa1c
-
SSDEEP
3072:zjIuZoQoo2I497iBJeWIJvF/mPVGWNQ2wII+P3X1UZ:x7f4I8Vg9GW22xIS3X
Malware Config
Signatures
Files
-
87a2bd997a39c446c15e9d0d3f7daa898fa569c5036eba353f3fd358e0ca2555.exe windows x86
749af71336f6b93c914698d958983277
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocalTime
GetModuleHandleW
GetProcAddress
CreateFileMappingA
GetSystemDefaultLCID
CopyFileA
GetModuleFileNameW
SetThreadLocale
IsBadCodePtr
GetCurrentProcessId
LCMapStringW
GetCommandLineW
GetStartupInfoW
FreeEnvironmentStringsA
VirtualProtectEx
EnumCalendarInfoA
GetStringTypeExA
GetProcessHeap
VirtualProtect
msvcrt
_XcptFilter
_controlfp
__p__commode
__setusermatherr
calloc
__set_app_type
__p__fmode
__p___initenv
free
_adjust_fdiv
_exit
__getmainargs
_initterm
_except_handler3
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 27KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ